International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 135 | Views: 228

Review Papers | Computer Science & Engineering | India | Volume 7 Issue 5, May 2018 | Popularity: 6.6 / 10


     

Reversible Data Hiding in Encrypted Images by Vacating Space in Advance

Prerna N. Deshmukh, Praveen Sathya


Abstract: Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image contents condentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extract ion and/or image restoration. In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. Experiments show that this novel method can embed more than 10 times as large payloads for the same image quality as the previous methods, such as for PSNR dB.


Keywords: Reversible data hiding, image encryption, privacy protection, histogram shift


Edition: Volume 7 Issue 5, May 2018


Pages: 616 - 619



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Prerna N. Deshmukh, Praveen Sathya, "Reversible Data Hiding in Encrypted Images by Vacating Space in Advance", International Journal of Science and Research (IJSR), Volume 7 Issue 5, May 2018, pp. 616-619, https://www.ijsr.net/getabstract.php?paperid=NOV151077

Similar Articles

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1285 - 1287

Location Based Social Networking in Geo-Social Applications

Shamsiamol K Shaji, Boby Jose

Share this Article

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2681 - 2683

Efficient and Confident Sharing of Personal Healthcare Records using Attribute Based Encryption in Cloud Computing

Nitin Raut, Seema Singh

Share this Article
Top